Tag Archive: Technical Support

Online Scamming to Extort Money Using False FBI Messages

Beware of the Fake FBI Messages on your PC

The rise of internet has brought people from all over the world closer. Now, it is not only easier to interact with people but you can do almost everything online. But along the comforts of internet, comes the nuisances of online scammers.

With a drastic change in how we do our banking and pay for goods and services, millions of people surfing the internet fall victim to hackers and cyber thugs every day.

Yet another incidence has come to light wherein online scammers look forward to thieve you. The Federal Bureau of Investigation (FBI) has cautioned computer users to ignore a phony message, supposedly from its officers, that freezes computer screens and asks them to pay a fine for visiting undesirable websites.


Reveton ransomware, also known as “drive-by” virus, freezes a user’s computer and display a fake FBI message stating that there was a violation of the federal law and they would have to pay fine for visiting an inappropriate website.

The malware enters a user’s computer thorough an attachment and gets installed when he visits an infected website. Once infected, the victim’s computer freezes immediately, and the monitor displays a screen stating that user’s IP address has been identified by FBI or the Department of Justice’s Computer Crime and Intellectual Property Section or any other department for visiting child pornography sites or participating in any other illegal online activity. And to unblock their system, user will have to pay a fine using a prepaid money card service. Or else, criminal charges would be filed against him.

The virus is nothing but a scare ware designed by cyber hooligans and thieves to frighten innocent computer users and extort money from them.


Here are the suggestions given by The Internet Crime Complaint Center for the victims of the Reveton virus:

  • Do not pay or provide any personal information.
  • Even if u are able to unfreeze your computer, the malware may still be working in the background, stealing all your personal info like passwords, credit card numbers, photos, videos, etc. File a complaint and look for updates about the Reveton virus on the IC3 website.
  • Get technical help from a computer professional to delete the virus from your computer.

PCCare247 is a premier Technical Support Company with Certified experts resolving all your computer issues round-the-clock. Get rid of all computer threats and protect your computer system from virus, malware, spyware and many other maladies with 24×7 computer technical support services by PCCare247.

Computer Security Tips

Computer Security

Mounting information needs and the pervasive use of computer networks, especially internet, to meet these requirements has made computers vulnerable to security threats stealing user’s privacy.

Safeguarding oneself from such security threats and protecting their private data like bank details, email account, photos, videos, etc. from being leaked to the world, users must take some precautionary steps.

Precautionary Steps

Email Security

  • Remove unfamiliar Emails: Delete email attachments from unknown people without opening them as they may contain malwares or virus eyeing confidential information on your computer. Also, beware of strange links or attachments given in Instant Messaging (IM) programs as they may have malicious codes attached.
  • Use smart passwords: Use strong passwords with a minimum of eight characters with a mix of special symbols, numbers and letters. Use different passwords for different accounts.

Secure your Computer

  • Enable Firewall: Install firewalls on computers as they keep unauthorized programs from attacking the computer systems even if they have access to your network.
  • Use updated Antivirus software: Use a trusted antivirus program with regular updates, as an outdated antivirus program may not protect you from newer threats developed by hackers.
  • Use anti-spyware/Anti-malware protection: Install a trusted anti-spyware and anti-malware program. Make sure you keep these programs updated.

Browser Security

Select browsers wisely. Be it Microsoft Internet Explorer, Google Chrome or Mozilla Firefox, each browser offer distinctive features with different security settings. Check your Browser Security and Privacy settings periodically, matching your internet activities and usage level.

Use Encryption

If you store your personal data on a laptop or other portables devices, use encryption software. Encrypting the devices helps in protecting the data stored in the device in case it is stolen or lost.

Online Privacy

  • Read Privacy Policies: Make sure you read the privacy policies of websites you are visiting before disclosing any personal information, to ensure security of the data supplied.
  • Avoid downloading files from insecure websites: Download files like wallpapers, screensavers, games, or other programs from secure websites only. Always download files to the Downloads folder and make sure you scan the folder before running them.
  • Social networking safety: Check and disable the GPS locator of your mobile device to display your location on social networking sites like Facebook, Twitter, Orkut, Stumbleupon, etc. while uploading pictures or videos, if you don’t want the world to know your current location.
  • Shop online safely: While submitting purchase information, check for the lock icon on the browser’s status bar that indicates secure submission of data. Also, be sure that “https” appears in the browser address bar before making an online purchase as this indicates the site being secure.

A defenseless computer system without any protective shield is more likely to get infected by viruses and hackers than a computer with some defending mechanism. So, adopting these precautionary steps can dodge the threats mongering the cyber world and protect your computer falling prey to threats unarmed.

Despite taking these precautionary measures, your computer may fall prey to such threats making your computing experience an annoying one. To ensure complete security of your computer system, comprehensive computer technical support services from eminent organizations like PCCare247 must be sought. PCCare247 provides comprehensive Computer support services including Virus Removal, Malware Removal, Spyware Removal, Windows OS Support, Printer Help, Network Support, Browser support and many more.

PCCare247 which has been a major player in providing Computer Support services globally is now offering extensive Mac support services for your Apple products too. Free yourself of all your computer worries by selecting PCCare247 as your computer service provider.

Browser Suppport
Smart browsing ways

Getting on the information highway is fun, an expression used by internet “noobs’’ to the hilt. But then in actual parlance it is rather the opposite because being a newbie to world of internet means a direct exposure to security threats, virus, malware and so what not. That is why at PCCare247 we thought why not share with you good browsing habits and the tools which turn them into something good. So, without any further adieu here are the good browsing habits.

  • Selecting a Browser wisely

A browser as an application provides a safe platform for accessing websites. Be it Microsoft Internet Explorer, Google Chrome or Mozilla Firefox all of them have their own set of unique features. And if one was to heed the advice of computer support professionals at PCCare247, Google Chrome’s interface is not only highly effective, safe and light at the same time. An option considered as perfect for new PC users.

  • Trustworthy Search Engine

Search Engines are vital components of the World Wide Web. And as it goes without saying, not all Search Engines are considered to be safe. A case in point where and one would need to select a Search Engine judiciously. So, starting in the order of the safety we would recommend you would select one that ends up meeting your requirements. Well, then going ahead and starting in a chronological order with Google, Bing, Yahoo, DuckDuckGo and Ask.com.

  • Software Downloads

Go on and take advice of Browser Support and Technical Support professionals seriously. Any recommendation from their side to refrain from activities such as free download of software applications, serials and cracks needs to be paid attention.

  • Inculcate habits of a good netizen

You can always end up acting as a role model for fellow netizens. To do this just try and be a good reader and avoid an activity like trolling that would simply end up annoying netizens more than making them happy.

  • Don’t overdo things

Something in excess is always bad. So, while paying heed to the advice of Browser Support professionals, we would recommend you to not to do anything in excess. Thus, putting things back in perspective one should try and take a break from browsing every now and then.  A good way to give those eyes, neck and hands the much needed rest.

The Internet contains a vast array of information not to be found in any other medium. So, it also ends up being a place where good browsing habits end up promoting and fostering an atmosphere of unity amongst fellow netizens. Considered as an Ideology in which PCCare247 and its elite brand of techies believe in big time.     

Cyber Security - New Year Resolution
Cyber Security Resolutions for 2012

Finally, it’s the New Year!!! Time for getting prepared for what you have missed last year and time to get your skates on for newer goals with a spanking new fervor! But wait a sec, aren’t you missing on something? What about your digital life? – shouldn’t it be a never-to-be-missed item in your New Year itinerary?

2011: A picture perfect year for hackers

2011 saw the cybercrime reaching its zenith. With virus writers up with their evil brainchild, the position of cyber security slipped from its already dilapidated position. Blended threats proved to be the viable route for hackers to spread their dangerous intents. As always email proved to be a desirable medium for them as email attachments and links to corrupted sites have gained profound popularity. A faked video of Osama bin Laden was circulated among the internet users globally, which also contained a virus. Even Lady Gaga’s Twitter account couldn’t escape from being on the hit list of hackers as they found it an easy deal to hack it and use it as a perfect pedestal to further amplify the reach of their attack. The news of a cyber attack on the network of U.S Chamber of Commerce also made it to the headlines of the newspaper dailies.

2012: Time for revamping security

This year also cyber goons are not giving a miss to any chance to loot your digital valuables. Need of the hour is to get updated on your online security essentials so that you don’t have to bear the brunt of a virus attack. Here are some of the apt suggestions that can assist you to tread your path rightly when you are on www. domain.

  • Get updated on your security front

That’s an absolutely imperative task which should never slip from your mind. As viruses are getting smarter, it’s necessary that you should be updated with your PC’s first line of defense i.e. firewalls, antivirus and anti-spyware. Never hit on to “remind me later” in the case your PC tells you it’s ready for an update.

  • Go for strong and separate passwords

If you have an easy-to-guess password like your birthday date or name of your pet, it’s time to do away with them instantly. Give your password a mix of numbers, alphabets and special characters so that they can become a tricky nut to crack. Also, keep separate passwords for separate accounts.

  • Bank upon Online Technical Support

If all doesn’t gel well after following the above given points, then the ideal solution is to go for a professional advice through Online Technical Support. And if it’s all about your Cyber security, nothing better than virus removal solutions offered by PCCare247 can work better for you.

PCCare247 has got newer security formulations for every need. You can go for a variety of services such as Virus Removal, Malware Removal, Spyware Removal, Antivirus Support to ensure complete safety of your PC when you go for online crusade.

X-box live

Microsoft's X-Box Live Hacked

Microsoft’s Xbox Live online gaming service, believed to be a un-hack-able service, has been attacked by hackers resulting in millions of stolen money. As per thriving reports, Xbox live users complained of fraud charges done from their credit and debit cards to acquire extra Microsoft points. (Currency used within service to purchase extra games, add-ons and in-game items.) Further, this stolen money is believed to be utilized to buy downloadable content from EA Sports – expressly Ultimate Team Packs for its games FIFA 12, Madden and NBA.

Various Xbox Live users claim to be thieved with hundreds of pounds from their accounts by swindlers who deceived them into handing over passwords using forged emails.

Repelling hackers

To spot the counterfeits and dodge hackers of victimizing you, following steps may be taken:

Beware of Disguises: Hackers can easily skit the “From” field in emails. Hence, if a message says it comes from customerservice@xboxlive.com, does not mean it really does.

Suspicious Links: Phishing emails deceive users to click on insecure websites which furthermore steals user’s personal information. Hence, a user must not be misled to click on such links.

Check the URL: On clicking on links in emails, a careful assessment of URL in browser’s address bar must be done, as criminals generally obtain a web address similar to genuine Marks and Spencer website.

Check for encryption: Genuine e-commerce websites use encryption to protect sensitive data from being stolen. A website asking for data, without a padlock symbol in browser indicates an insecure website which may be a phishing attempt. Furthermore, address bar of latest browsers turns green for genuine websites asking for financial information.

Never download: Criminals can trick users into downloading malicious files into their systems, distributing viruses, stealing banking information.

Users must regularly examine their bank statements, used for payment of Xbox Live account subscriptions and subsequent purchases of Microsoft Points used to download EA Sports content. In case of abnormalities, changing of passwords and contacting Microsoft’s Xbox Live customer service would be a good strategy. Also, Microsoft provides the facility of erasing payment details of service by calling customer service desk.

With an option of purchasing Gold subscriptions and Microsoft Points from shops, customers can get cards bearing redeem codes to be entered into Xbox 360, without giving Microsoft credit card or bank details.

To save your PC from such cyber criminals and ensure complete PC security, help from best players in the field of technical support may be sought, helping you preserve your privacy.

Spyware Support

Spyware - Stealthily entering your PC

In the current era where computers and networks seem to dominate, the internet is being effectively used as a medium for sharing information and knowledge. Highly considered for its ability to offer  something sweet as well as bitter; leading to not only ease of information sharing and timeliness but at the same time fanning threats of data theft and reduced privacy.

On occasions even leading to breach of confidential information and data to fulfill all sorts of unlawful financial, political, social activities and motives.

Know Spywares

Spywares are considered as a category of malware which when installed on a PC end up gathering information about all its users without seeking permission. Spywares sneak into the computer systems which are hidden from the user and are very tough to detect.

Spyware merely do not just secretly monitor the user’s computer but also gather personal information related to internet surfing habits and the sites being visited. Further, as it goes a spyware can also interfere with the user control of a computer through installation of additional software and redirection of Web browser activity. One of those abilities which has the power to modify computer settings resulting in slow connection speeds, different home pages, loss of internet connection or functionality of other programs.

Deceitfulness of Spywares:

Due to the menace being spread around by Spywares; a number of organizations have seriously started considering the prospect of providing anti-spyware software for safeguarding computer systems. Authorities around the world have ended up passing anti-spyware laws, targeting any software furtively installed into a user’s computer to take tight control of its activities.

Development of various programs like hijackers and key loggers by shared, corporate, or public computers to secretly monitor their activities. At times even bringing into use spyware software not only capable of stealing Email ID’s, passwords but for that matter even credit card information.

Apart from moral principles and privacy issues, spyware also ends up stealing from a user by using a computer’s memory resources and bandwidth.  With the spyware even going on to make use of memory and system resources and causing applications in the background to even crash or become unstable.

Leading experts to develop surveillance tools which allow a PC user to monitor any activities on a computer, stretching from a keystroke capture to chat logging, snapshots to email logging and well almost everything considered as suspicious. Tools devised for parents, enterprises and similar environments, but can end up being misused if installed on a computer without prior information.

Disengage Spywares:

The Anti-spyware laws passed by the authorities across the globe have not been able to halt criminal tendencies possessed by spywares. Often forcing PC users to seek expert help from premier organizations specializing in anti-spyware support and any espionage related matters. Leading to a conclusion that the best technical support comes in handy wherein a user needs to guard his system from deceitful activities of cyber criminals; often looking to eye a PC user’s privacy for their own benefit.